Sei sulla pagina 1di 22

Defense In-Depth

FORESEC Academy
Security Essentials (II) :
Defense In-Depth

Defense in-Depth Agenda


Defense

in-Depth
Basic Security Policy
Access Control and Password
Management
Incident Handling Foundations
Information Warfare
Web Communications and Security

Defense in-Depth
We have covered: networking, IP, IP
behaviour, basic traffic analysis, routing,
host perimeter defense.
Now, we add security policy, password
strength and assessment, incident handling,
information warfare and web security.

Defense in-Depth (2)

Three Bedrock Principles


Confidentiality
Integrity
Availability

Identity, Authentication &


Authorization
Dont

Authentication and Identity


mean the same thing?
If we have Authentication and
Identity then do we need
Authorization?

Authentication
Based

on:
- Something you know
Password, PIN
- Something you have Photo ID
or Security Token
- Something you are Biometrics

Security Token

Combined

with a PIN, this is two factor


authentication - something you have and
something you know.

Biometric authentication
Iris

scanners
Retinal scanners
Hand geometry substantiaters
Finger scanners, and many others
as well . . . even facial scanners

Biometric authentication
Despite

its rising popularity, biometric


authentication is not without its
downsides. Once compromised, unlike
passwords or tokens, biometric
parameters cannot be changed.
However, some aspects of the body
can be simulated for detectors, as
seen in many spy movies.

Data Classification
We

classify data with differing levels


of sensitivity
Why do we put labels on our data?
You cant protect it all so some data
requires more protection than others

A quick listing of the DoD and federal


Top Secret - The highest levels of protection are
levels

given to this data; it is critical to protect.


Secret - This data is important, and its release could
harm national security.
Confidential - This is important, and it could be
detrimental to national security if released.
Sensitive But Unclassified (SBU) - This generally is
information that is sensitive and should not be
released (like SSNs).
Unclassified - They prefer to keep it from being
released but the nation would not be harmed if it
were.

Threats
Activity

that represents possible danger


Can come in different forms & from different
sources
There are physical threats, like fires, floods,
terrorist activities, and random acts of
violence.
And there are electronic threats, like hackers,
vandals, and viruses.

Threats
You

cant protect against all threats


Protect against the ones that are most
likely or most worrisome based on:
- Business goals
- Validated data
- Industry best practice

Vulnerabilities
Weaknesses

that allow threats to

happen
Must be coupled with a threat to have
an impact
Can be prevented (if you know about
them)

Relating Risk, Threat and


Vulnerability
Risk

= Threat x Vulnerability

The Threat Model


Threat
Vulnerability
Compromise

Vulnerabilities are the gateways


by which threats are manifested.

Five Lessons from History


Morris

worm Availability 1988


Melissa - Availability 1999
W32.SirCam worm - Confidentiality 2001
Code Red II - Integrity 2001
Blaster worm - Availability and
Integrity - 2003

Potrebbero piacerti anche